A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Phishing Snuffing out a phishing attack before it’s got started is easier than you think

Sponsored by Cofense
How proper employee cyber-training and robust defence software saved a company from huge losses with minutes to spare. If a …

Phishing Phishing attacks soar 220% during COVID-19 peak as cybercriminal opportunism intensifies

COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, according to new research from F5 Labs. Released today, the …

Ransomware Ransomware can interfere with elections and fuel disinformation

Ransomware can interfere with elections and fuel disinformation. Basic cybersecurity precautions are key to minimizing the damage

Threat intelligence Threat Hunting: demystifying myths and misconceptions

The term ‘threat hunting’, whilst widely used, is open to interpretation. It’s one of the most important approaches for any …

Threats Encrypted ransomware captured in micro-virtual machines

Ransomware is now less likely to be delivered by email than by human hackers

Threats In the wild west of remote work, organisations need to hunt for threats

Organisations need to take a proactive approach to understand their attackers, assuming they have been breached and dedicating time to …

Cyber attack Attacking home networks

What approaches are cybercriminals using to attack people's home networks? "You don’t have to sit in front of the house …

Cyber attack Cyber security trends over the next 2 years

How will the Cybersecurity landscape evolve over the next 2-3 years? "The attacks will be more professional, even more than …

Third party risk Assessing the visibility of supply chain risks

How can you assess the visibility of supply chain risk? “Different organisations – customers, suppliers – have different views about …

Phishing Exploiting the pandemic

How have cybercriminals exploited the pandemic for cyber attacks? "Working from home makes people significantly more vulnerable.” Professor Marco Gercke, …

Hacking How predictive threat specialists track hackers on the Dark Web

Even before the current coronavirus pandemic inflicted itself upon the world, cyberthreats were already making themselves known to businesses and …

Third party risk Business continuity and the supply chain

What is the best way to build a business continuity plan that outlines alternative suppliers? “Make sure resilience is built …